Results 1 to 10 of about 6,515,199 (373)

A Fuel‐Driven Lock‐and‐Key System [PDF]

open access: goldChemistryOpen
This study introduces a fuel‐driven lock‐and‐key system based on the interaction between crown ether and ammonium ion. In this simple model system, a key‐like molecule with an amino group functions as the key, while 15‐crown‐5 serves as the lock.
Shilin Zhang   +4 more
doaj   +3 more sources

Entropy driven key-lock assembly [PDF]

open access: yesThe Journal of Chemical Physics, 2008
The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism ...
Gerardo Odriozola   +2 more
core   +7 more sources

Two-piece obturator using “lock-and-key” mechanism

open access: diamondThe Journal of Indian Prosthodontic Society, 2017
This paper describes a method used for the fabrication of a two-piece denture obturator for a patient who had surgical removal of the premaxilla due to squamous cell carcinoma. The patient had been wearing a two-piece obturator but encountered difficulty
Prema Sukumaran, Michael R Fenlon
doaj   +3 more sources

A DNA dual lock-and-key strategy for cell-subtype-specific siRNA delivery

open access: yesNature Communications, 2016
Delivery of siRNA to target cells is essential for in vivogene therapy. Here the authors demonstrate an oligonucleotide aptamer that targets therapeutic siRNA to a specific cell type.
Ying Liu, Yue Zhang, Min Yang
exaly   +3 more sources

Management of grossly destroyed endodontically treated teeth with lock and key custom modified cast post and core design: A case series

open access: goldContemporary Clinical Dentistry, 2015
The purpose of this paper is to demonstrate a more retentive custom modified lock and key design of metal cast post and core for the restoration of grossly destroyed endodontically treated molar tooth.
E Deenadayalan   +4 more
doaj   +2 more sources

Dynamics of particles with “key-lock” interactions [PDF]

open access: greenEPL (Europhysics Letters), 2008
The dynamics of particles interacting by key-lock binding of attached biomolecules are studied theoretically. Examples of such systems include DNA-functionalized colloids as well as nanoparticles grafted with antibodies to cell membrane proteins.
Nicholas A. Licata, Alexei V. Tkachenko
  +8 more sources

Acoustically levitated lock and key grains

open access: yesPhysical Review Research, 2023
We present a scheme for generating shape-dependent, specific bonds between millimeter scale particles, using acoustic levitation. We levitate particles in an ultrasonic standing wave, allowing for substrate-free assembly.
Melody X. Lim, Heinrich M. Jaeger
doaj   +4 more sources

SIMULASI KUNCI ELEKTRONIK DENGAN ENKRIPSI MELALUI BLUETOOTH PADA PONSEL [PDF]

open access: yesCommIT Journal, 2008
Currently the facility provided by mobile phones is very diverse. Starting from the phone, SMS, camera, music player, all rolled into one. Obviously the phone can also be used as electronic keys to replace the existing analog key at this time.
Indri Neforawati, Hoga Saragih
doaj   +3 more sources

Implementation of Suitcase Lock Security System Using Near Field Communication (NFC) and Global Positioning System (GPS)

open access: yesJurnal Jaringan Telekomunikasi, 2023
A key is a tool made of metal to open or fasten a door or object that has a lock by inserting it into the hole in the main key. The lock itself is usually used on doors, suitcases, or other objects that require security.
Hudiono Hudiono   +2 more
doaj   +1 more source

A Secure Scan Architecture Protecting Scan Test and Scan Dump Using Skew-Based Lock and Key

open access: yesIEEE Access, 2021
Scan-based Design for Testability (DFT) is widely used in industry as it consistently provides high fault coverage. However, scan-based DFT is prone to security vulnerabilities where attackers use the scan design to obtain secret information from the ...
Hyungil Woo, Seokjun Jang, Sungho Kang
doaj   +1 more source

Home - About - Disclaimer - Privacy